"Given enough eyeballs, all bugs are shallow". With claims vendors are being pushed into providing the NSA with backdoors, you'd do well to go open source over the closed alternative.

The Tor Network bounces user comms around a distributed network of relays run by volunteers. The goal is to reduce the chance of attackers knowing the sites you visit, and to prevent the sites knowing your physical location.
More: https://www.torproject.org

HTTPS Everywhere is a Firefox and Chrome security extension built by the Tor Project and the Electronic Frontier Foundation. It works by rewriting URLs based on matching requests against a series of regular-expression-based rules.
More: https://www.eff.org/https-everywhere

While reports suggest if the NSA wants in to your computer, it will get it, a flavour of Linux will see you more secure than running Windows.

Avoid big businesses. If the claims about the NSA forcing the likes of Facebook, Google and Microsoft into providing backdoors are true, then you may be better off with the little guys.

Tails is a live Debian operating system run from a DVD or a USB drive. It comes with built-in apps pre-configured with security in mind including a web browser, instant messaging client, email client, office suite, and an image and sound editor.
More: https://tails.boum.org

Silent Circle is popular with users seeking secure communications. It works by encrypting user communications end-to-end from devices. They can also call users who are not on the platform in which case their call will traverse Silent Circle then hit the PSTN.
These are the guys who shut down their free email service in light of alleged pressure from the US national security complex.
More: https://silentcircle.com

WhisperSystems' RedPhone enables encrypted voice communication between RedPhone users. It works with the system dialer but uses ZRTP to setup an encrypted VoIP channel for the actual call.
More: https://whispersystems.org

Tarsnap is billed as storage for the paranoid. It's written by FreeBSD's Colin Percival and accessible via terminal. He runs a security vulnerability bug bounty service for the platform.
More: https://www.tarsnap.com

TextSecure, another WhisperSystems' offering, is a replacement for the standard text messaging application, allowing you to send and receive text messages as normal with local and in-transit encryption.
More: https://whispersystems.org

Whonix, formerly known as TorBox, was a virtualised Debian deployment that runs in two parts: a gateway running and an isolated network workstation. All traffic runs through Tor.
More: https://www.whonix.org/wiki/Main_Page

BleachBit is an open source tool that erases caches, cookies, net histories and a wide array of temporary files across Linux and Windows to 'prevent' file recovery.
More: http://bleachbit.sourceforge.net

Password Safe is an open source encrypted password manager. It protects passwords with a master password and Twofish encryption. Its keys are derived using an equivalent of PBKDF2 with SHA-256 and 2048 iterations.
More: http://pwsafe.org

Barada turns phones into a two factor authentication device via an implementation of the HOTP protocol in the form of a PAM module (the server) and an Android application (the client).
More: http://barada.sourceforge.net

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.Your use of this website
constitutes acceptance of nextmedia's Privacy Policy and
Terms & Conditions.